Lucene search

K
gentooGentoo FoundationGLSA-202011-01
HistoryNov 03, 2020 - 12:00 a.m.

BlueZ: Arbitrary code execution

2020-11-0300:00:00
Gentoo Foundation
security.gentoo.org
26

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.05 Low

EPSS

Percentile

92.7%

Background

Set of tools to manage Bluetooth devices for Linux.

Description

It was discovered that there was a double-free vulnerability in Bluez after the service discovery which occurs after a Bluetoth Low Energy (BLE) connection has been established to a device.

Impact

A remote attacker, by enticing a user to connect to a malicious GATT server or device, could cause the execution of arbitrary code with the privileges of the user running gatttool client or cause a Denial of Service condition.

Workaround

There is no known workaround at this time.

Resolution

All BlueZ users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=net-wireless/bluez-5.55"
OSVersionArchitecturePackageVersionFilename
Gentooanyallnet-wireless/bluez< 5.55UNKNOWN

8.6 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.05 Low

EPSS

Percentile

92.7%